Impact of New EU Data Legislation Not Widely Understood

quick-guide-eu-general-data-protection-regulation-and-smart-metering-11-638.jpg?cb=1410159254

Almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation will mean to them or their organizations, according to iStorage.

The EU will soon have the power to fine companies €100 million or 5% of their annual turnover if they are found to be in breach of the new legislation, which compels anyone who holds data on EU citizens to implement adequate security measures to protect data from loss or theft.

With encryption largely recognized as the primary method of security by rendering data unintelligible to any unauthorized access, the forthcoming legislation exempts anyone from notifying the affected subjects if the data that was lost or stolen was encrypted.

"The EU’s position is very clear: all personal information must be protected by adequate security to prevent the loss or theft of data,” states John Michael, CEO of iStorage. “The majority of significant security breaches occur where confidential data has been stored on an unencrypted portable device. Organizations need to give serious consideration to minimizing the risks of loss by ensuring that all portable media devices containing personal information are robustly encrypted.”

90% of respondents to the survey at Counter Terror Expo in London confirmed that policies are in place within their organizations covering data protection matters, while a further 80% were specifically aware of who was directly responsible for data protection with these organizations.

Asked about the methods currently used to store business data, 22% confirmed the use of cloud technology, yet a sizeable number (65%) did not consider the cloud to be a secure method of storing confidential data.

Net-Security: http://bit.ly/1bZQSFN

« Germany’s BND Intelligence Agency Has Been Spying for the NSA.
Hacking Aviation Technology »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.